The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A novel image segmentation algorithm based on the HSI color space and an improved mean shift is proposed. The current work is discussed form two perspectives, i.e., the color space more suitable for human being's perception is selected and the segmentation algorithm is improved sufficiently. Unlike many of the traditional algorithms, the proposed algorithm is nonparametric and does not require any...
The Improved Forward Backward Method and Symmetric Successive over Relaxation (SSOR) method are proposed to compute electromagnetic (EM) scattering from 1-D dielectric rough surfaces. In addition the Spectral Acceleration (SA) technique is applied to reduce the computational complexity of each matrix-vector product from O(N2) to O(N). The proposed methods are referred as IFBM-SA and SSOR-SA. They...
The performance of the best relay selection on the decode-and-forward (DF) mode cognitive radio relay networks is studied. Some important factors, such as the outage probability, the bit error ratio (BER), and the average channel capacity, are analysed in this paper. As compared to the conventional relay selection schemes, the impact of spectrum sensing process as well as the spectrum utilization...
In this paper, we develop a Maximum-A-Posterior wavelet-based particle filter (MAP-WPF) and apply it to estimating the states and parameters of the chaotic systems with uncertain parameters and unknown parameters. To implement the proposed method, the covariance of the observation sequence is estimated using the wavelet transform, and the proper weights of particles are obtained accordingly. In addition,...
We develop a new experimental system for secure communication with nonlinear mixing of information signal and chaotic signal of a time-delay system. The proposed scheme is based on programmable microcontrollers with digital transmission line. The scheme allows one to transmit and receive speech and musical signals in a real time without noticeable distortion.
According to the features of high dimensional, nonlinear and redundant of the Credit Scoring data, the establishment of a model for credit scoring has a direct bearing on the complexity of personal credit scoring process and the collection of characteristic parameters reflecting the credit scoring status constitutes an important link for setting up a efficient model, to resolve the problem that it...
Aiming at the detecting and tracking of the moving dim targets from image observations with low signal-to-noise ratio(SNR), this paper puts forward a new track-before-detect algorithm based on Gaussian particle filter implementation of Multi-Bernoulli filter (GPF-MB-TBD). GPF-MB-TBD can greatly reduce the requirement for storing, and improve the performance of tracking than the sequential Monte Carlo...
In this paper, we present a novel algorithm to accurately estimate time-variant noises without signal activity detection for acoustic signal enhancement. This is the first algorithm that does not require nor assume noise-only at the beginnings of recordings. This is the first algorithm that can directly estimate noises during the signal activity periods instead of by smoothing noises from neighbouring...
An interleaver improves the performance of communication system in severe electro-magnetic environment. However, it brings about long time delay. A convolutional interleaver reduces much more time delay than those other conventional ones. In this paper, we give a novel structure of convolutional interleaver which introduces less delay. Simulational results show that the new convolutional interleaver...
We propose a definition of the class of all fairness properties of concurrent systems. In this work, we introduce to the fair transition system, and then discuss the relation among safety property, liveness property and fairness property in the temporal logic of actions. On the way, we give a recent overview work on fairness in reactive and concurrent systems, and innovatively prove the relation among...
Aim at the energy limited for wireless sensor network, a clustering algorithm with isolated nodes based on the DEEC algorithm is proposed. In this algorithm, the cluster heads are still selected using DEEC, but the mechanism of the nodes joining a cluster is improved. Firstly, the distances of the nodes to the all cluster heads and to the sink are calculated separately. According to the shortest distance...
In this paper, we describe a lightweight solution for protecting real-time collaborative editing systems against Byzantine faults. We observe that a centralized coordination algorithm not only reduces the complexity of the editing system, it makes easier to harden the system with Byzantine fault tolerance. We perform a comprehensive analysis of the potential threats towards collaborative editing systems...
Although the existing P2P trust models can provide effective resistance to the false recommendation of a single node attack, they general lack effective means of identification and prevention mechanisms to the node collusion attack. In this paper we present the conspiracy group detection model based on behaviour similarity. Both the malicious node detection success rate and normal node false detection...
Synchrophasor systems will play a significant role in next generation Smart Grid monitoring, protection and control. However, these systems also introduce a multitude of potential vulnerabilities and cyber threats from malicious attackers or disgruntled employees, which may cause erroneous situational awareness or severe damage. This paper proposes a Synchrophasor Specific Intrusion Detection System...
Cascading failure in a network refers to a situation when the failure of a node causes the failure of its neighbouring nodes, which in turn leads to the failure of other nodes in the network. Cascading failure happens in many real world networks e.g., power grid, packet routing networks.
Distributed information flow control has several advantages over centralized information flow control for securing composite services in service oriented environments. In this paper, an approach of distributed information flow control which utilizes security labels to convey control information is considered. At first, security labels are formally defined to describe the control information of information...
Many anonymization methods have been used in data publishing and data mining. In the meantime, they reduce the utility of the dataset. So it is important to consider the trade-off between privacy and utility. Quantifying the trade-off between usefulness and privacy of dataset has been the subject of much research in recent years. In this paper, we provide the concepts of privacy loss and utility loss...
In this paper, we propose a new approach for building mission-critical systems with an emphasis on intrusion tolerance. The fundamental mechanisms employed in this approach includes: (1) The separation of execution and state management, which enables the use of a single process to manage application requests, thereby reducing runtime overhead and enables highly concurrent executions. (2) The append-only...
The Wideband Global SATCOM (WGS) system is being developed to provide the ability of flexible band-switching in satellite, so-called “any coverage to any coverage”. With the digital channelizer transponder used in, the transponder power gain of individual links could be adjusted respectively. Heterogeneous gain states can be especially useful for balancing the needs of dissimilar links in the same...
The selection of relaying node has an important influence on the D2D system performance. Previous literatures always utilize one selection strategy and consider only the reliability of the system. The strategy we propose determines which relay scheme to use according to the specific communication context. After the best relaying node is determined, we do the power allocation for that best relay for...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.